![]() |
Chilkat HOME Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi DLL Go Java Node.js Objective-C PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(PowerBuilder) Verify Authenticode Signature of EXE or DLLSee more Code Signing ExamplesDemonstrates how to verify an Authenticode signed EXE or DLL.Note: Chilkat's code signing class was added in v9.5.0.97
integer li_rc string ls_Path oleobject loo_Json oleobject loo_Validator integer li_Valid string ls_IssuerCN string ls_Serial oleobject loo_GenTime oleobject loo_Dt integer i integer li_Count_i integer li_NumSigners // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // You can verify a signed DLL or EXE. ls_Path = "c:/someDir/something.dll" // The verify method returns an overall indicator of whether // the EXE or DLL can be trusted or not. // The details of the signature are emitted to the JSON object // passed in the last argument. loo_Json = create oleobject // Use "Chilkat_9_5_0.JsonObject" for versions of Chilkat < 10.0.0 li_rc = loo_Json.ConnectToNewObject("Chilkat.JsonObject") if li_rc < 0 then destroy loo_Json MessageBox("Error","Connecting to COM object failed") return end if loo_Json.EmitCompact = 0 loo_Validator = create oleobject // Use "Chilkat_9_5_0.CodeSign" for versions of Chilkat < 10.0.0 li_rc = loo_Validator.ConnectToNewObject("Chilkat.CodeSign") li_Valid = loo_Validator.VerifySignature(ls_Path,loo_Json) if li_Valid = 0 then // Validation failed. Write-Debug loo_Validator.LastErrorText // You can also examine the details of the validation (see below) Write-Debug loo_Json.Emit() destroy loo_Json destroy loo_Validator return end if // Examine the details of the Authenticode signature // println json.Emit(); // An example of the JSON details of an authenticode signature, with selected parsing code, is shown below. // // Use this online tool to generate parsing code from sample JSON: // Generate Parsing Code from JSON // { // "pkcs7": { // "verify": { // "peFile": { // "hashOid": "2.16.840.1.101.3.4.2.1", // "hash": "q9tzWEcea8f8kaMXG8LpWNPe9JIW7aKccYWuL3mrCBw=" // }, // "certs": [ // { // "issuerCN": "AAA Certificate Services", // "serial": "48FC93B46055948D36A7C98A89D69416" // }, // { // "issuerCN": "Sectigo Public Code Signing Root R46", // "serial": "621D6D0C52019E3B9079152089211C0A" // }, // { // "issuerCN": "Sectigo Public Code Signing CA R36", // "serial": "3FF5B69109BFD4046C92CC0D18EE23C2" // } // ], // "digestAlgorithms": [ // "sha256" // ], // "signerInfo": [ // { // "cert": { // "serialNumber": "3FF5B69109BFD4046C92CC0D18EE23C2", // "issuerCN": "Sectigo Public Code Signing CA R36", // "digestAlgOid": "2.16.840.1.101.3.4.2.1", // "digestAlgName": "SHA256" // }, // "contentType": "1.3.6.1.4.1.311.2.1.4", // "messageDigest": "4MkPVkY4qdwoVAj5JcCvn3ISSS5yqtf1+KmIs/Ckni4=", // "signingAlgOid": "1.2.840.113549.1.1.1", // "signingAlgName": "RSA-PKCSV-1_5", // "authAttr": { // "1.3.6.1.4.1.311.2.1.12": { // "der": "MAA=" // }, // "1.2.840.113549.1.9.3": { // "name": "contentType", // "oid": "1.3.6.1.4.1.311.2.1.4" // }, // "1.3.6.1.4.1.311.2.1.11": { // "der": "MAwGCisGAQQBgjcCARU=" // }, // "1.2.840.113549.1.9.4": { // "name": "messageDigest", // "digest": "4MkPVkY4qdwoVAj5JcCvn3ISSS5yqtf1+KmIs/Ckni4=" // } // }, // "unauthAttr": { // "1.3.6.1.4.1.311.3.3.1": { // "name": "timestampToken", // "der": "MIIXJwY ... QZej", // "verify": { // "digestAlgorithms": [ // "sha256" // ], // "signerInfo": [ // { // "cert": { // "serialNumber": "0544AFF3949D0839A6BFDB3F5FE56116", // "issuerCN": "DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA", // "digestAlgOid": "2.16.840.1.101.3.4.2.1", // "digestAlgName": "SHA256" // }, // "contentType": "1.2.840.113549.1.9.16.1.4", // "signingTime": "240117124047Z", // "messageDigest": "y6cKjJoRfgJwW+Dj29w3tEfWqVybz7Sg+d8opKQxCjM=", // "signingAlgOid": "1.2.840.113549.1.1.1", // "signingAlgName": "RSA-PKCSV-1_5", // "authAttr": { // "1.2.840.113549.1.9.3": { // "name": "contentType", // "oid": "1.2.840.113549.1.9.16.1.4" // }, // "1.2.840.113549.1.9.5": { // "name": "signingTime", // "utctime": "240117124047Z" // }, // "1.2.840.113549.1.9.16.2.12": { // "name": "signingCertificate", // "der": "MBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQA==" // }, // "1.2.840.113549.1.9.4": { // "name": "messageDigest", // "digest": "y6cKjJoRfgJwW+Dj29w3tEfWqVybz7Sg+d8opKQxCjM=" // }, // "1.2.840.113549.1.9.16.2.47": { // "name": "signingCertificateV2", // "der": "MCYwJDAiBCDS9uRt7XQizNHUQFdoQTZvgoraVZquMxavTRqa1Ax4KA==" // } // } // } // ], // "uncommonOptions": "NO_SIGCERTV2_OID,NoSigningCertV2IssuerSerial" // }, // "timestampSignatureVerified": true, // "tstInfo": { // "tsaPolicyId": "2.16.840.1.114412.7.1", // "messageImprint": { // "hashAlg": "sha256", // "digest": "JqY7U+30qScMnRQwnDfUYEikZwOLHMhKX0oo5zo4ils=", // "digestMatches": true // }, // "serialNumber": "6E4597E574BC909213565DAEBC0E4888", // "genTime": "20240117124047Z" // } // } // } // } // ], // "pkcs7": { // "verify": { // "certs": [ // { // "issuerCN": "DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA", // "serial": "0544AFF3949D0839A6BFDB3F5FE56116" // }, // { // "issuerCN": "DigiCert Trusted Root G4", // "serial": "073637B724547CD847ACFD28662A5E5B" // }, // { // "issuerCN": "DigiCert Assured ID Root CA", // "serial": "0E9B188EF9D02DE7EFDB50E20840185A" // } // ] // } // } // } // } // } loo_GenTime = create oleobject // Use "Chilkat_9_5_0.DtObj" for versions of Chilkat < 10.0.0 li_rc = loo_GenTime.ConnectToNewObject("Chilkat.DtObj") loo_Dt = create oleobject // Use "Chilkat_9_5_0.CkDateTime" for versions of Chilkat < 10.0.0 li_rc = loo_Dt.ConnectToNewObject("Chilkat.CkDateTime") // Show the certificates embedded in the PKCS7 signature. Write-Debug "Certificates contained in the PKCS7 signature:" i = 0 li_Count_i = loo_Json.SizeOfArray("pkcs7.verify.certs") do while i < li_Count_i loo_Json.I = i ls_IssuerCN = loo_Json.StringOf("pkcs7.verify.certs[i].issuerCN") ls_Serial = loo_Json.StringOf("pkcs7.verify.certs[i].serial") Write-Debug ls_IssuerCN + ", " + ls_Serial i = i + 1 loop // Show details about the signing certificate(s) li_NumSigners = loo_Json.SizeOfArray("pkcs7.verify.signerInfo") i = 0 do while i < li_NumSigners loo_Json.I = i Write-Debug "---- Signing Certificate ----" Write-Debug "serial number: " + loo_Json.StringOf("pkcs7.verify.signerInfo[i].cert.serialNumber") Write-Debug "issuerCN: " + loo_Json.StringOf("pkcs7.verify.signerInfo[i].cert.issuerCN") Write-Debug "hash algorithm: " + loo_Json.StringOf("pkcs7.verify.signerInfo[i].cert.digestAlgName") Write-Debug "signing algorithm: " + loo_Json.StringOf("pkcs7.verify.signerInfo[i].signingAlgName") // If this signature includes a timestamp token, get information about it. if loo_Json.HasMember("pkcs7.verify.signerInfo[i].unauthAttr.~"1.3.6.1.4.1.311.3.3.1~"") = 1 then // We're going to assume the timestamp token had only 1 signer.. Write-Debug "--- Timestamp Token ----" Write-Debug "TS hash algorithm: " + loo_Json.StringOf("pkcs7.verify.signerInfo[i].unauthAttr.~"1.3.6.1.4.1.311.3.3.1~".verify.digestAlgorithms[0]") Write-Debug "TS certificate serial: " + loo_Json.StringOf("pkcs7.verify.signerInfo[i].unauthAttr.~"1.3.6.1.4.1.311.3.3.1~".verify.signerInfo[0].cert.serialNumber") Write-Debug "TS certificate issuerCN: " + loo_Json.StringOf("pkcs7.verify.signerInfo[i].unauthAttr.~"1.3.6.1.4.1.311.3.3.1~".verify.signerInfo[0].cert.issuerCN") Write-Debug "timestamp signature verified: " + string(loo_Json.BoolOf("pkcs7.verify.signerInfo[i].unauthAttr.~"1.3.6.1.4.1.311.3.3.1~".timestampSignatureVerified")) loo_Json.DtOf("pkcs7.verify.signerInfo[i].unauthAttr.~"1.3.6.1.4.1.311.3.3.1~".tstInfo.genTime",0,loo_GenTime) loo_Dt.SetFromDtObj(loo_GenTime) Write-Debug "timestamp date/time: " + loo_Dt.GetAsRfc822(1) end if i = i + 1 loop Write-Debug "The Authenticode signature is valid." // Sample output: // Certificates contained in the PKCS7 signature: // AAA Certificate Services, 48FC93B46055948D36A7C98A89D69416 // Sectigo Public Code Signing Root R46, 621D6D0C52019E3B9079152089211C0A // Sectigo Public Code Signing CA R36, 3FF5B69109BFD4046C92CC0D18EE23C2 // ---- Signing Certificate ---- // serial number: 3FF5B69109BFD4046C92CC0D18EE23C2 // issuerCN: Sectigo Public Code Signing CA R36 // hash algorithm: SHA256 // signing algorithm: RSA-PKCSV-1_5 // --- Timestamp Token ---- // TS hash algorithm: sha256 // TS certificate serial: 0544AFF3949D0839A6BFDB3F5FE56116 // TS certificate issuerCN: DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA // timestamp signature verified: True // timestamp date/time: Wed, 17 Jan 2024 06:40:47 -0600 // The Authenticode signature is valid. destroy loo_Json destroy loo_Validator destroy loo_GenTime destroy loo_Dt |
© 2000-2025 Chilkat Software, Inc. All Rights Reserved.